Browse Definitions :

Browse Definitions by Alphabet

  • N+1 UPS - N+1, also called parallel redundancy, is a safeguard to ensure that an uninterruptible power supply (UPS)system is always available.
  • N_Port ID virtualization (NPIV) - N_Port ID virtualization (NPIV) is a Fibre Channel (FC) standard that makes it possible to create multiple virtual ports on a single physical node port (N_Port), with each virtual port appearing as a unique entity to the FC network.
  • NACK (NAK, negative acknowledgment, not acknowledged) - NACK, or NAK, an abbreviation for negative acknowledgment or not acknowledged, is a signal used by computers or other devices to indicate that data transmitted over a network was received with errors or was otherwise unreadable.
  • Nagios - Nagios is an open source IT system monitoring tool.
  • named entity - In data mining, a named entity is a phrase that clearly identifies one item from a set of other items that have similar attributes.
  • named entity recognition (NER) - Named entity recognition (NER) is a natural language processing (NLP) method that extracts information from text.
  • NAND flash memory - NAND flash memory is a type of non-volatile storage technology that does not require power to retain data.
  • NAND flash wear-out - NAND flash wear-out is the breakdown of the oxide layer within the floating gate transistors of NAND flash memory.
  • nanocrystal - A nanocrystal is a crystalline particle with at least one dimension measuring less than 1000 nanometers (nm), where 1 nm is defined as 1 thousand-millionth of a meter (10-9 m).
  • nanomachine (nanite) - A nanomachine, also called a nanite, is a mechanical or electromechanical device whose dimensions are measured in nanometers (millionths of a millimeter, or units of 10 -9 meter).
  • nanopaint - Nanopaint is a coating that can modify the properties of a surface or substance according to user-defined parameters.
  • nanosecond (ns or nsec) - A nanosecond (ns or nsec) is one-billionth (10-9) of a second.
  • narrow AI (weak AI) - Narrow AI is an application of artificial intelligence technologies to enable a high-functioning system that replicates -- and perhaps surpasses -- human intelligence for a dedicated purpose.
  • narrowband IoT (NB-IoT) - Narrowband IoT (NB-IoT) is a wireless internet of things (IoT) protocol that uses low-power wide area network (LPWAN) technology.
  • NAS gateway - NAS gateway is a NAS (network-attached storage) system in which the storage media are externally attached, typically over a Fibre Channel interface.
  • National Electrical Code (NEC) - National Electrical Code (NEC) is a set of regularly updated standards for the safe installation of electric wiring in the United States.
  • national identity card - A national identity card is a portable document, typically a plasticized card with digitally embedded information, that is used to verify aspects of a person's identity.
  • national provider identifier (NPI) - A national provider identifier (NPI) is a unique ten-digit identification number required by HIPAA for covered healthcare providers in the United States.
  • National Security Agency (NSA) - The National Security Agency (NSA) is a federal government intelligence agency that is part of the United States Department of Defense and is managed under the authority of the director of national intelligence (DNI).
  • native app - A native application is a software program developers build for use on a particular platform or device.
  • native code - Native code is binary data compiled to run on a processor, such as an Intel x86-class processor.
  • natural disaster recovery - Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.
  • natural language generation (NLG) - Natural language generation (NLG) is the use of artificial intelligence (AI) programming to produce written or spoken narratives from a data set.
  • natural language processing (NLP) - Natural language processing (NLP) is the ability of a computer program to understand human language as it’s spoken and written -- referred to as natural language.
  • natural language query - A natural language query is input that consists solely of terms or phrases spoken normally or entered as they might be spoken, without any non-language characters, such as the plus symbol or the asterisk, and without any special format or alteration of syntax.
  • natural language understanding (NLU) - Natural language understanding (NLU) is a branch of artificial intelligence (AI) that uses computer software to understand input in the form of sentences using text or speech.
  • natural number - A natural number is a number that occurs commonly and obviously in nature.
  • natural user interface (NUI) - A natural user interface -- or NUI -- is an interface that is designed to feel as natural as possible.
  • NBASE-T Ethernet - NBASE-T Ethernet is an IEEE standard and Ethernet-signaling technology that enables existing twisted-pair copper cabling to exceed the cable's specified limit of 1 gigabit per second (Gbps) for distances of up to 100 meters.
  • NBMA (non-broadcast multiple access) - Non-broadcast multiple access (NBMA) is one of four network types in the Open Shortest Path First (OSPF) communications protocol.
  • NDIS (Network Driver Interface Specification) - Network Driver Interface Specification (NDIS) is a Microsoft Windows specification for how communication protocol programs (such as TCP/IP) and network device drivers should communicate with each other.
  • near-end crosstalk (NEXT) - Near-end crosstalk (NEXT) is an error condition that can occur when connectors are attached to twisted pair cabling.
  • near-field communication (NFC) - Near-field communication (NFC) is a short-range wireless connectivity technology that uses magnetic field induction to enable communication between devices when they're touched together or brought within a few centimeters of each other.
  • nearline storage - Nearline storage is the on-site storage of data on removable media.
  • nearshore outsourcing - Nearshore outsourcing is the practice of getting work done or services performed by people in neighboring countries rather than an organization's country.
  • needs assessment - A needs assessment is a systematic process that examines what criteria must be met in order to reach a desired outcome.
  • negative float (negative slack) - Negative float, also known as negative slack, is a common concept in project management that refers to the amount of time that must be saved to complete a project on time.
  • neighborhood electric vehicle (NEV) - A neighborhood electric vehicle (NEV) is a type of battery-electric vehicle that is capable of traveling at a maximum speed of 25 mph and which has a maximum loaded weight of 3,000 lbs.
  • neobank - A neobank is a type of fintech that offers direct banking services to individuals and organizations, without traditional physical branches.
  • Nessus - Nessus is a platform developed by Tenable that scans for security vulnerabilities in devices, applications, operating systems, cloud services and other network resources.
  • Nest Labs - Nest Labs was a home automation specialist company that produced programmable Wi-Fi-enabled products that can be remotely controlled through a Web service or an associated smart home app.
  • net neutrality - Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application or platform used.
  • net price - The net price is the value at which a product or service is sold after all taxes and other costs are added and all discounts subtracted.
  • Net Promoter Score (NPS) - Net Promoter Score (NPS) is a metric that organizations use for assessing customer loyalty toward their brand, products or services.
  • net zero - Net zero refers to a state in which all human-caused greenhouse gas emissions are counterbalanced so humanity no longer adds carbon to the atmosphere.
  • NetApp - NetApp, formerly Network Appliance Inc.
  • NetApp Data Fabric - The products and services that compose NetApp’s Data Fabric are designed to provide customers with the agility they need to quickly and efficiently move data to and from the cloud.
  • NetApp SolidFire - NetApp SolidFire is a business division of NetApp Inc.
  • NetBeans - NetBeans is a Java-based integrated development environment (IDE).
  • NetBIOS (Network Basic Input/Output System) - NetBIOS (Network Basic Input/Output System) is a network service that enables applications on different computers to communicate with each other across a local area network (LAN).
  • NetFlow - NetFlow is a network protocol developed by Cisco for the collection and monitoring of network traffic flow data that is generated by most Cisco routers and switches.
  • netizen - A netizen is a person who uses the internet, especially as a forum, for the expression of views and participation in political society.
  • Netscape - Netscape Communications Corporation ("Netscape") was a computer services company best known for its web browser, Navigator.
  • NetSuite - NetSuite is a business technology vendor based in San Mateo, California.
  • network access control (NAC) - Network access control (NAC), also called network admission control, is a method to bolster the security, visibility and access management of a proprietary network.
  • Network Address Translation (NAT) - A Network Address Translation (NAT) is the process of mapping an internet protocol (IP) address to another by changing the header of IP packets while in transit via a router.
  • network analytics - Network analytics is the application of big data principles and tools to the data used to manage and secure data networks.
  • network analyzer (protocol analyzer or packet analyzer) - A network analyzer -- also called a network protocol analyzer or packet analyzer -- is a software application, dedicated appliance or feature set within a network component used in network performance troubleshooting or to enhance protection against malicious activity within a corporate network.
  • Network as a Service (NaaS) - Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.
  • network assurance - Network assurance is the method of validating whether services and policies configured on and across network appliances appropriately align with operational goals.
  • network automation - Network automation is a methodology in which software automatically configures, provisions, manages and tests network devices.
  • network configuration management (NCM) - Network configuration management is the process of organizing and maintaining information about all of the components in a computer network.
  • Network Configuration Protocol (NETCONF) - The Network Configuration Protocol (NETCONF) is an Internet Engineering Task Force (IETF) network management protocol that provides a secure mechanism for installing, manipulating and deleting the configuration data on a network device such as a firewall, router or switch.
  • network convergence - Network convergence is the efficient coexistence of telephone, video and data communication within a single network.
  • Network Data Management Protocol (NDMP) - Network Data Management Protocol (NDMP) is an open protocol to control data backup and recovery communications between primary and secondary storage in a heterogeneous network environment.
  • network disaster recovery plan - A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of network services during a natural or humanmade catastrophe.
  • network downtime - Network downtime refers to inaccessibility to part or all of a network due to the failure of hardware, software or some combination of the two.
  • network drive - A network drive is a shared storage device on a local area network (LAN) within a business or home.
  • network engineer - A network engineer is a technology professional who has the necessary skills to plan, implement and oversee the computer networks that support in-house voice, data, video and wireless network services.
  • network fabric - 'Network fabric' is a general term used to describe underlying data network infrastructure as a whole.
  • Network File System (NFS) - Network File System (NFS) is a networking protocol for distributed file sharing.
  • network functions virtualization (NFV) - Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have traditionally run on proprietary, dedicated network appliances.
  • network hub - A network hub is a node that broadcasts data to every computer or Ethernet-based device connected to it.
  • network interface card (NIC) - A network interface card (NIC) is a hardware component, typically a circuit board or chip, installed on a computer so it can connect to a network.
  • network intrusion protection system (NIPS) - A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer networks from unauthorized access and malicious activity.
  • Network layer - Located at Layer 3 of the Open Systems Interconnection (OSI) communications model, the primary function of the network layer is to move data into and through other networks.
  • network load balancing (NLB) - Network load balancing (NLB) is a feature in multiple versions of the Microsoft Windows Server operating system (OS), Amazon Web Services (AWS) and other cloud service providers that distribute network traffic among multiple servers or virtual machines (VMs) within a cluster to avoid overloading any one host and improve performance.
  • network management - A cornerstone of all computing is the ability to connect one machine, system or device to another -- enabling what is known as a computer network.
  • network management system - A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's independent components inside a bigger network management framework and performs several key functions.
  • network monitoring - Network monitoring, also frequently called network management, is the practice of consistently overseeing a computer network for any failures or deficiencies to ensure continued network performance.
  • network node - A computer network is a system of computers and computing devices that are connected via communication links.
  • network operating system (NOS) - A network operating system (NOS) is a computer operating system (OS) that's designed primarily to support workstations, PCs and, in some instances, older terminals that are connected on a local area network (LAN).
  • network operations center (NOC) - A network operations center (NOC) is a centralized place from which enterprise information technology (IT) administrators -- either internal or third party -- supervise, monitor and maintain a telecommunications network.
  • network orchestration - Network orchestration is the use of a software-defined network controller that facilitates the creation of network and network security services to achieve business goals.
  • network packet - A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a packet-switched network, such as the internet.
  • network performance monitoring (NPM) - Network performance monitoring (NPM) is the process of measuring and monitoring the quality of service of a network.
  • network protocol - A network protocol is a set of established rules that specify how to format, send and receive data so that computer network endpoints, including computers, servers, routers and virtual machines, can communicate despite differences in their underlying infrastructures, designs or standards.
  • network scanning - Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal to devices and await a response.
  • network security - Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it.
  • network segmentation - Network segmentation is a networking architectural design that divides a network into multiple segments (subnets) with each functioning as a smaller, individual network.
  • network service provider (NSP) - A network service provider (NSP) is a company that owns, operates and sells access to internet backbone infrastructure and services.
  • network slicing - Network slicing is a technique that creates multiple virtual networks on top of a shared physical network to provide greater flexibility in the use and allocation of network resources.
  • network switch - A network switch connects devices in a network to each other, enabling them to talk by exchanging data packets.
  • Network Time Protocol (NTP) - Network Time Protocol (NTP) is an internet protocol used to synchronize with computer clock time sources in a network.
  • network topology - A network topology is the physical and logical arrangement of nodes and connections in a network.
  • network traffic - Network traffic is the amount of data that moves across a network during any given time.
  • network visibility - Network visibility is an awareness of the components and data within an enterprise computer network.
  • network vulnerability scanning - Network vulnerability scanning is the process of inspecting and reporting potential vulnerabilities and security loopholes on a computer, network, web application or other device, including firewalls, switches, routers and wireless access points.
  • networking (computer) - Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system.
  • neural net processor - A neural net processor is a central processing unit (CPU) that holds the modeled workings of how a human brain operates on a single chip.
Networking
  • NBASE-T Ethernet

    NBASE-T Ethernet is an IEEE standard and Ethernet-signaling technology that enables existing twisted-pair copper cabling to ...

  • SD-WAN security

    SD-WAN security refers to the practices, protocols and technologies protecting data and resources transmitted across ...

  • net neutrality

    Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application ...

Security
  • proof of concept (PoC) exploit

    A proof of concept (PoC) exploit is a nonharmful attack against a computer or network. PoC exploits are not meant to cause harm, ...

  • virtual firewall

    A virtual firewall is a firewall device or service that provides network traffic filtering and monitoring for virtual machines (...

  • cloud penetration testing

    Cloud penetration testing is a tactic an organization uses to assess its cloud security effectiveness by attempting to evade its ...

CIO
  • Regulation SCI (Regulation Systems Compliance and Integrity)

    Regulation SCI (Regulation Systems Compliance and Integrity) is a set of rules adopted by the U.S. Securities and Exchange ...

  • strategic management

    Strategic management is the ongoing planning, monitoring, analysis and assessment of all necessities an organization needs to ...

  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

HRSoftware
  • ADP Mobile Solutions

    ADP Mobile Solutions is a self-service mobile app that enables employees to access work records such as pay, schedules, timecards...

  • director of employee engagement

    Director of employee engagement is one of the job titles for a human resources (HR) manager who is responsible for an ...

  • digital HR

    Digital HR is the digital transformation of HR services and processes through the use of social, mobile, analytics and cloud (...

Customer Experience
  • customer retention

    Customer retention is a metric that measures customer loyalty, or an organization's ability to retain customers over time.

  • virtual agent

    A virtual agent -- sometimes called an intelligent virtual agent (IVA) -- is a software program or cloud service that uses ...

  • chatbot

    A chatbot is a software or computer program that simulates human conversation or "chatter" through text or voice interactions.

Close